Home > Research > Security Lancaster (Academic Centre of Excellence) > Publications & Outputs
View graph of relations

Security Lancaster (Academic Centre of Excellence)

  1. Published

    A framework for the design and evaluation of network resilience management

    Schaeffer-Filho, A., Smith, P., Mauthe, A., Hutchison, D., Yu, Y. & Fry, M., 1/04/2012, Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, p. 401-408 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  2. Published

    A Frequency Dictionary of Mandarin Chinese: Core vocabulary for learners

    Xiao, R., Rayson, P. & McEnery, T., 2009, London: Routledge.

    Research output: Book/Report/ProceedingsBook

  3. Published

    A fully autonomous data density based clustering algorithm

    Hyde, R. & Angelov, P., 9/12/2014, Evolving and Autonomous Learning Systems (EALS), 2014 IEEE Symposium on. Piscataway, N.J.: IEEE, p. 116-123 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  4. Published

    A game theoretical network-assisted user-centric design for resource allocation in 5G heterogeneous networks

    Munir, H., Hassan, S. A., Pervaiz, H. B. & Ni, Q., 15/05/2016, 2016 IEEE 83rd Vehicular Technology Conference (VTC Spring). IEEE, p. 1-5 5 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  5. Published

    A general purpose intelligent surveillance system for mobile devices using deep learning

    Antoniou, A. & Angelov, P. P., 24/07/2016, 2016 International Joint Conference on Neural Networks (IJCNN). Vancouver Canada: IEEE, p. 2879-2886 8 p. (Neural Networks (IJCNN), 2016 International Joint Conference on).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  6. Published

    A Generalized Methodology for Data Analysis

    Angelov, P. P., Gu, X. & Principe, J., 10/2018, In: IEEE Transactions on Cybernetics. 48, 10, p. 2981-2993 13 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  7. Published

    A GNSS/5G Integrated Positioning Methodology in D2D Communication Networks

    Yin, L., Ni, Q. & Deng, Z., 02/2018, In: IEEE Journal on Selected Areas in Communications. 36, 2, p. 351-362 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  8. Published

    A heuristic for maximising energy efficiency in OFDMA systems with QoS constraints

    Letchford, A. N., Ni, Q. & Zhong, Z., 1/07/2018, Combinatorial Optimization: 5th International Symposium. Lee, J., Rinaldi, G. & Mahjoub, A. R. (eds.). Springer, p. 303-312 10 p. (Lecture Notes in Computer Science; vol. 10856).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter (peer-reviewed)peer-review

  9. Published

    A Hierarchical P2PSIP Architecture to Support Skype-like Services

    Martinez-Yelmo, I., Guerrero, C., Cuevas, R. & Mauthe, A., 2009, PDP '09: Proceedings of the 2009 17th Euromicro International Conference on Parallel, Distributed and Network-based Processing. Washington, DC, USA: IEEE Computer Society, p. 316-322 7 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  10. Published

    A History of Violence: Mearsheimer and Walt's Writings from ‘An Unnecessary War’ to the ‘Israel Lobby’ Controversy

    Lacy, M., 2008, In: Geopolitics. 13, 1, p. 100-119 20 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  11. Published

    A K-Anonymity Based Schema for Location Privacy Preservation

    Fei, F., Li, S., Dai, H., Hu, C., Dou, W. & Ni, Q., 1/04/2019, In: IEEE Transactions on Sustainable Computing. 4, 2, p. 156-167 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  12. Published

    A longitudinal analysis of estimation accuracy, counting skills and mathematical ability across the first school year

    Muldoon, K., Towse, J., Simms, V., Perra, O. & Menzies, V., 02/2013, In: Developmental Psychology. 49, 2, p. 250-257 8 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  13. Published

    A Low-Latency Interference Coordinated Routing for Wireless Multi-hop Networks

    Cheng, J., Yang, P., Navaie, K., Ni, Q. & Yang, H., 15/03/2021, In: IEEE Sensors Journal. 21, 6, p. 8679 - 8690 12 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  14. Published

    A MAC Protocol for Industrial Process Automation and Control

    Suriyachai, P., Brown, J. & Roedig, U., 02/2010.

    Research output: Contribution to conference - Without ISBN/ISSN Posterpeer-review

  15. Published

    A Markovian Model for the Analysis of Age of Information in IoT Networks

    Abbas, Q., Hassan, S. A., Pervaiz, H. & Ni, Q., 31/07/2021, In: IEEE Wireless Communications Letters. 10, 7, p. 1596-1600 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  16. Published

    A Massively Parallel Deep Rule-Based Ensemble Classifier for Remote Sensing Scenes

    Gu, X., Angelov, P. P., Zhang, C. & Atkinson, P. M., 03/2018, In: IEEE Geoscience and Remote Sensing Letters. 15, 3, p. 345-349 5 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  17. Published

    A mathematical framework for spectroscopy data analysis to characterize chemical-induced alterations in the SHE assay

    Trevisan, J., Angelov, P. P., Carmichael, P. L., Scott, A. D. & Martin, F. L., 11/2010, In: Mutagenesis. 25, 6, p. 658-658 1 p.

    Research output: Contribution to Journal/MagazineMeeting abstractpeer-review

  18. Published

    A Method for Autonomous Data Partitioning

    Gu, X., Angelov, P. P. & Principe, J., 09/2018, In: Information Sciences. 460-461, p. 65-82 18 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  19. Published

    A methodology for the development and verification of access control systems in cloud computing

    Gouglidis, A. & Mavridis, I., 2013, Collaborative, Trusted and Privacy-Aware e/m-Services. Douligeris, C., Polemi, N., Karantjias, A. & Lamersdorf, W. (eds.). Berlin: Springer Verlag, p. 88-99 12 p. (IFIP Advances in Information and Communication Technology ; vol. 399).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNOther chapter contribution

  20. Published

    A minimum data set approach to post-mortem computed tomography reporting for anthropological biological profiling

    Brough, A. L., Morgan, B., Robinson, C., Black, S., Cunningham, C., Adams, C. & Rutty, G. N., 12/2014, In: Forensic Science, Medicine and Pathology. 10, 4, p. 504-512 9 p.

    Research output: Contribution to Journal/MagazineJournal articlepeer-review

  21. Published

    A Minimum Distance guided Genetic Algorithm for Multi-User Detection in a Multi-Carrier CDMA Wireless Broadband System

    Ni, Q., Jehanzeb, J., Zhang, Y. & Guan, S-U., 2008, Broadband Communications, Networks and Systems, 2008. BROADNETS 2008. 5th International Conference on. New York: IEEE, p. 500-505 6 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  22. Published

    A mobile healthcare system using IMS and the HL7 framework

    Nikolidakis, S., Giotsas, V., Vergados, D. & Douligeris, C., 2009, ANCS '09 Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems. New York: ACM Press, p. 187-188 2 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

  23. Published

    A Multi-commodity network flow model for cloud service environments

    Stephanakis, I. M., Shirazi, S. N. U. H., Gouglidis, A. & Hutchison, D., 2016, Engineering Applications of Neural Networks: 17th International Conference, EANN 2016, Aberdeen, UK, September 2-5, 2016, Proceedings. Jayne, C. & Iliadis, L. (eds.). Cham: Springer, p. 186-197 12 p. (Communications in Computer and Information Science; vol. 629).

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  24. Published

    A multi-layer and multi-tenant cloud assurance evaluation methodology

    Hudic, A., Tauber, M., Lorunser, T., Krotsiani, M., Spanoudakis, G., Mauthe, A. & Weippl, E. R., 12/2014, Proceedings of 6th IEEE International Conference on Cloud Computing Technology and Science, IEEE Cloud Comp 2014,. Piscataway, N.J.: IEEE, p. 386-393 8 p.

    Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNConference contribution/Paperpeer-review

  25. Published

    A Multi-Level Approach to Resilience of Critical Infrastructures and Services

    Gouglidis, A., Shirazi, S. N. U. H., Simpson, S., Smith, P. & Hutchison, D., 2016.

    Research output: Contribution to conference - Without ISBN/ISSN Conference paperpeer-review

Previous 1 2 3 4 5 6 7 8 ...65 Next

Back to top